SlideShare a Scribd company logo
1 of 36
Download to read offline
Copyright © by HiveMQ. All Rights Reserved.
Copyright © by HiveMQ. All Rights Reserved.
Speaker
● Product Marketing lead at HiveMQ
● Telecoms, Unified Comms,
Networking, Software technology
● Solutions Architect and Product
Manager
● Based in Ottawa, Canada
gaurav.suman@hivemq.com
Gaurav Suman
https://www.linkedin.com/in/grvsmn/
@grvsmn
Product Marketing Director @HiveMQ
Copyright © by HiveMQ. All Rights Reserved.
Why is IoT Security on
top-of-mind for devs and
architects?
Copyright © by HiveMQ. All Rights Reserved.
The Internet of Things is HUGE
Copyright © by HiveMQ. All Rights Reserved.
Copyright © by HiveMQ. All Rights Reserved.
The risks are clear
Copyright © by HiveMQ. All Rights Reserved.
IoT security challenges are unique
● Low-power devices
Copyright © by HiveMQ. All Rights Reserved.
● Spread far and wide
● Long lifecycle of devices
Copyright © by HiveMQ. All Rights Reserved.
HiveMQ: Security
Copyright © by HiveMQ. All Rights Reserved.
Copyright © by HiveMQ. All Rights Reserved.
Multiple Security Layers
Network
Host
Application
Data
Enterprise
We will bankrupt ourselves in
the vain search for absolute
security.
- D.E. Eisenhower
Copyright © by HiveMQ. All Rights Reserved.
Securing the IoT connectivity stack
Copyright © by HiveMQ. All Rights Reserved.
What’s special about
MQTT?
Confidential and Proprietary. Copyright © by HiveMQ. All Rights Reserved.
Copyright © by HiveMQ. All Rights Reserved.
What Is MQTT?
• Easy on the device side, pushes all implementation
complexity to the server
• Publish/Subscribe based architecture
• Created for extreme scale and instant data exchange
• (I)IoT Messaging Protocol
• Built for machines and constrained devices (binary,
data agnostic)
• Designed for reliable communication over unreliable
channels
Copyright © by HiveMQ. All Rights Reserved.
Connected Car
IIoT /
Industry 4.0
Logistics Telecommunication
IoT Messaging
Middleware
MQTT Use Cases
Copyright © by HiveMQ. All Rights Reserved.
The MQTT specification ‘specifies’
MQTT solutions are often deployed in hostile communication
environments. In such cases, implementations will often need
to provide mechanisms for:
● Authentication of users and devices
● Authorization of access to Server resources
● Integrity of MQTT Control Packets and application data
contained therein
● Privacy of MQTT Control Packets and application data
contained therein
Copyright © by HiveMQ. All Rights Reserved.
MQTT Broker
• Conserve
• Decouple
• Centralize Policy
Copyright © by HiveMQ. All Rights Reserved.
Transport Encryption
● MQTT is based on TCP / IP Stack
● Port 1883: MQTT over TCP
/ TLS
● TCP connection can be secured by TLS
● Port 8883: MQTT over TLS
Copyright © by HiveMQ. All Rights Reserved.
How MQTT helps secure IoT
Copyright © by HiveMQ. All Rights Reserved.
Authentication and Authorization
Copyright © by HiveMQ. All Rights Reserved.
● Client ID
● Username
● Password
● Digital Certificates
● OAuth, JWT
Copyright © by HiveMQ. All Rights Reserved.
Authentication
Copyright © by HiveMQ. All Rights Reserved.
● Digital Certificates
● Wire the broker and the auth store
Copyright © by HiveMQ. All Rights Reserved.
Advanced Authentication Options
Copyright © by HiveMQ. All Rights Reserved.
● Typically relies on a public certificate
authority
● Can also work with private certificates
○ Only for closed networks
Using certificates for TLS
Copyright © by HiveMQ. All Rights Reserved.
● You need control over the MQTT client
● Managing the Certificate lifecycle
○ Certification Revocation Lists (CRLs)
○ Online Certificate Status Protocol
Copyright © by HiveMQ. All Rights Reserved.
Consider these when using X.509 based Authentication
Copyright © by HiveMQ. All Rights Reserved.
OCSP Stapling: Authentication at Scale
Copyright © by HiveMQ. All Rights Reserved.
Client Authentication (Identity and Access Management Systems)
● Different external systems can be used to
authenticate clients at a broker
● Client provides authentication data in the
CONNECT packet
● Broker looks up the authentication data in the
connected external systems
● External authentication systems:
○ LDAP
○ OAuth2.0
○ Databases
○ ACL
○ ...
Caution:
Not all brokers support a pluggable
authentication and authorization system!
Copyright © by HiveMQ. All Rights Reserved.
Creating Custom Authentication Logic
Copyright © by HiveMQ. All Rights Reserved.
● Publisher and Subscriber Authorization
○ Whether they can publish/subscribe
○ Which QoS level
○ Operations (read, write)
Copyright © by HiveMQ. All Rights Reserved.
Authorization
Copyright © by HiveMQ. All Rights Reserved.
Permissions
Copyright © by HiveMQ. All Rights Reserved.
Encryption
Copyright © by HiveMQ. All Rights Reserved.
Transport Encryption - Best Practices
• Use transport encryption (TLS)
• Use certificates from trusted CAs
• Use highest TLS version and secure
cipher suites
Copyright © by HiveMQ. All Rights Reserved.
Payload Encryption
● Use payload encryption instead
● Every clients needs to have key & secret
● BUT!: It leaks metadata
On very constrained devices transport encryption
may be not possible!
Copyright © by HiveMQ. All Rights Reserved.
DoS and Overload Protection
● Limit Connections and Connection Idle times
● Throttle Connection Rates including Burst Rates
● Throttle SSL Handshakes
● Throttle Network Bandwidth
● Cluster Overload Protection throttles overactive publishing
clients to prevent cluster overload
● Limit ClientID and topic length to prevent malfunctioning IoT
access
Copyright © by HiveMQ. All Rights Reserved.
Criteria for selecting the right MQTT Broker
• Performant, scalable and high available broker
• Compliance to the entire MQTT specification
• Monitoring of broker and tracing of devices
• Pluggable authentication & authorization system
• Overload Protection
• Supports TLS
• Professional support
Copyright © by HiveMQ. All Rights Reserved.
HiveMQ Security Architecture
● Pluggable Authentication and Authorization System
● Prebuilt Security Extension
● TLS secured communication
● Overload Protection and (D)DOS detection
● Fine grained permission system for MQTT clients and
HiveMQ Control Center users
● Chaining of auth mechanisms
● Default Deny-All behaviour
● Integrated monitoring system and over 1500 metrics
● 24/7 professional support
Copyright © by HiveMQ. All Rights Reserved.
HiveMQ Enterprise Security Extension
• Central management for IoT device and HiveMQ Control
Center authentication and authorization
• Flexible and easy integration with multiple external
authentication systems and data sources (e.g.
databases, LDAP, OAuth 2.0)
• High Scalability and reliability
• Default Whitelisting Concept
• Access log (rolling on daily basis)
• Provides maximum flexibility in defining authorization
rules
Copyright © by HiveMQ. All Rights Reserved.
Resources
Evaluate HiveMQ
Try HiveMQ Cloud
Get Started with MQTT
HiveMQ Enterprise Security Extension
Blog Series | MQTT Security Fundamentals
Watch Our Previous Security
Webinar Recording
ANY
QUESTIONS?
Reach out to community.hivemq.com
THANK YOU
Contact Details
Gaurav Suman
gaurav.suman@hivemq.com
https://www.linkedin.com/in/grvsmn/

More Related Content

Similar to IoT Security Issues and MQTT

Software-Infrastrukturen modernisieren in der Produktion - Digitale Transform...
Software-Infrastrukturen modernisieren in der Produktion - Digitale Transform...Software-Infrastrukturen modernisieren in der Produktion - Digitale Transform...
Software-Infrastrukturen modernisieren in der Produktion - Digitale Transform...Dominik Obermaier
 
Machine to Machine Communication with Microsoft Azure IoT Edge & HiveMQ
Machine to Machine Communication with Microsoft Azure IoT Edge & HiveMQMachine to Machine Communication with Microsoft Azure IoT Edge & HiveMQ
Machine to Machine Communication with Microsoft Azure IoT Edge & HiveMQHiveMQ
 
MQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfallsMQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfallsDominik Obermaier
 
MQTT.fx on HiveMQ Cloud Testing MQTT in the Cloud
MQTT.fx on HiveMQ Cloud Testing MQTT in the CloudMQTT.fx on HiveMQ Cloud Testing MQTT in the Cloud
MQTT.fx on HiveMQ Cloud Testing MQTT in the CloudHiveMQ
 
Simplified IoT Operations With HiveMQ and Datadog
Simplified IoT Operations With HiveMQ and DatadogSimplified IoT Operations With HiveMQ and Datadog
Simplified IoT Operations With HiveMQ and DatadogHiveMQ
 
Modernizing the Manufacturing Industry with Kafka and MQTT
Modernizing the Manufacturing Industry with Kafka and MQTT Modernizing the Manufacturing Industry with Kafka and MQTT
Modernizing the Manufacturing Industry with Kafka and MQTT Dominik Obermaier
 
Best Practices for Streaming Connected Car Data with MQTT & Kafka
Best Practices for Streaming Connected Car Data with MQTT & KafkaBest Practices for Streaming Connected Car Data with MQTT & Kafka
Best Practices for Streaming Connected Car Data with MQTT & KafkaHiveMQ
 
HiveMQ Cloud - The Cloud Native IoT Messaging Layer
HiveMQ Cloud - The Cloud Native IoT Messaging LayerHiveMQ Cloud - The Cloud Native IoT Messaging Layer
HiveMQ Cloud - The Cloud Native IoT Messaging LayerDominik Obermaier
 
Introducing HiveMQ Cloud
Introducing HiveMQ CloudIntroducing HiveMQ Cloud
Introducing HiveMQ CloudMargarethaErber
 
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmHiveMQ
 
Lightweight and Scalable IoT Messaging with MQTT
Lightweight and Scalable IoT Messaging with MQTTLightweight and Scalable IoT Messaging with MQTT
Lightweight and Scalable IoT Messaging with MQTTHiveMQ
 
HiveMQ + Kafka - The Ideal Solution for IoT MQTT Data Integration
HiveMQ + Kafka - The Ideal Solution for IoT MQTT Data IntegrationHiveMQ + Kafka - The Ideal Solution for IoT MQTT Data Integration
HiveMQ + Kafka - The Ideal Solution for IoT MQTT Data IntegrationHiveMQ
 
HiveMQ Webinar: Lightweight and scalable IoT Messaging with MQTT
HiveMQ Webinar: Lightweight and scalable IoT Messaging with MQTTHiveMQ Webinar: Lightweight and scalable IoT Messaging with MQTT
HiveMQ Webinar: Lightweight and scalable IoT Messaging with MQTTDominik Obermaier
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemInductive Automation
 
MQTT AS A KEY TECHNOLOGY FOR INDUSTRY 4.0 & IIoT
MQTT AS A KEY TECHNOLOGY FOR INDUSTRY 4.0 & IIoT MQTT AS A KEY TECHNOLOGY FOR INDUSTRY 4.0 & IIoT
MQTT AS A KEY TECHNOLOGY FOR INDUSTRY 4.0 & IIoT Dominik Obermaier
 
Securing MQTT - BuildingIoT 2016 slides
Securing MQTT - BuildingIoT 2016 slidesSecuring MQTT - BuildingIoT 2016 slides
Securing MQTT - BuildingIoT 2016 slidesDominik Obermaier
 
HiveMQ + Kafka: The ideal solution for IoT MQTT data integration
HiveMQ + Kafka: The ideal solution for IoT MQTT data integrationHiveMQ + Kafka: The ideal solution for IoT MQTT data integration
HiveMQ + Kafka: The ideal solution for IoT MQTT data integrationMargarethaErber
 
Back to Basics: An Introduction to MQTT
Back to Basics: An Introduction to MQTTBack to Basics: An Introduction to MQTT
Back to Basics: An Introduction to MQTTHiveMQ
 
How to Use InfluxDB to Visualize and Monitor MQTT Messages in an IIoT System
How to Use InfluxDB to Visualize and Monitor MQTT Messages in an IIoT SystemHow to Use InfluxDB to Visualize and Monitor MQTT Messages in an IIoT System
How to Use InfluxDB to Visualize and Monitor MQTT Messages in an IIoT SystemInfluxData
 

Similar to IoT Security Issues and MQTT (20)

Software-Infrastrukturen modernisieren in der Produktion - Digitale Transform...
Software-Infrastrukturen modernisieren in der Produktion - Digitale Transform...Software-Infrastrukturen modernisieren in der Produktion - Digitale Transform...
Software-Infrastrukturen modernisieren in der Produktion - Digitale Transform...
 
Machine to Machine Communication with Microsoft Azure IoT Edge & HiveMQ
Machine to Machine Communication with Microsoft Azure IoT Edge & HiveMQMachine to Machine Communication with Microsoft Azure IoT Edge & HiveMQ
Machine to Machine Communication with Microsoft Azure IoT Edge & HiveMQ
 
MQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfallsMQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfalls
 
MQTT.fx on HiveMQ Cloud Testing MQTT in the Cloud
MQTT.fx on HiveMQ Cloud Testing MQTT in the CloudMQTT.fx on HiveMQ Cloud Testing MQTT in the Cloud
MQTT.fx on HiveMQ Cloud Testing MQTT in the Cloud
 
Simplified IoT Operations With HiveMQ and Datadog
Simplified IoT Operations With HiveMQ and DatadogSimplified IoT Operations With HiveMQ and Datadog
Simplified IoT Operations With HiveMQ and Datadog
 
Modernizing the Manufacturing Industry with Kafka and MQTT
Modernizing the Manufacturing Industry with Kafka and MQTT Modernizing the Manufacturing Industry with Kafka and MQTT
Modernizing the Manufacturing Industry with Kafka and MQTT
 
Best Practices for Streaming Connected Car Data with MQTT & Kafka
Best Practices for Streaming Connected Car Data with MQTT & KafkaBest Practices for Streaming Connected Car Data with MQTT & Kafka
Best Practices for Streaming Connected Car Data with MQTT & Kafka
 
HiveMQ Cloud - The Cloud Native IoT Messaging Layer
HiveMQ Cloud - The Cloud Native IoT Messaging LayerHiveMQ Cloud - The Cloud Native IoT Messaging Layer
HiveMQ Cloud - The Cloud Native IoT Messaging Layer
 
Introducing HiveMQ Cloud
Introducing HiveMQ CloudIntroducing HiveMQ Cloud
Introducing HiveMQ Cloud
 
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
 
Lightweight and Scalable IoT Messaging with MQTT
Lightweight and Scalable IoT Messaging with MQTTLightweight and Scalable IoT Messaging with MQTT
Lightweight and Scalable IoT Messaging with MQTT
 
HiveMQ + Kafka - The Ideal Solution for IoT MQTT Data Integration
HiveMQ + Kafka - The Ideal Solution for IoT MQTT Data IntegrationHiveMQ + Kafka - The Ideal Solution for IoT MQTT Data Integration
HiveMQ + Kafka - The Ideal Solution for IoT MQTT Data Integration
 
HiveMQ Webinar: Lightweight and scalable IoT Messaging with MQTT
HiveMQ Webinar: Lightweight and scalable IoT Messaging with MQTTHiveMQ Webinar: Lightweight and scalable IoT Messaging with MQTT
HiveMQ Webinar: Lightweight and scalable IoT Messaging with MQTT
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
 
Iot in-production
Iot in-productionIot in-production
Iot in-production
 
MQTT AS A KEY TECHNOLOGY FOR INDUSTRY 4.0 & IIoT
MQTT AS A KEY TECHNOLOGY FOR INDUSTRY 4.0 & IIoT MQTT AS A KEY TECHNOLOGY FOR INDUSTRY 4.0 & IIoT
MQTT AS A KEY TECHNOLOGY FOR INDUSTRY 4.0 & IIoT
 
Securing MQTT - BuildingIoT 2016 slides
Securing MQTT - BuildingIoT 2016 slidesSecuring MQTT - BuildingIoT 2016 slides
Securing MQTT - BuildingIoT 2016 slides
 
HiveMQ + Kafka: The ideal solution for IoT MQTT data integration
HiveMQ + Kafka: The ideal solution for IoT MQTT data integrationHiveMQ + Kafka: The ideal solution for IoT MQTT data integration
HiveMQ + Kafka: The ideal solution for IoT MQTT data integration
 
Back to Basics: An Introduction to MQTT
Back to Basics: An Introduction to MQTTBack to Basics: An Introduction to MQTT
Back to Basics: An Introduction to MQTT
 
How to Use InfluxDB to Visualize and Monitor MQTT Messages in an IIoT System
How to Use InfluxDB to Visualize and Monitor MQTT Messages in an IIoT SystemHow to Use InfluxDB to Visualize and Monitor MQTT Messages in an IIoT System
How to Use InfluxDB to Visualize and Monitor MQTT Messages in an IIoT System
 

More from HiveMQ

Testing the Scalability of a Robust IoT System with Confidence
Testing the Scalability of a Robust IoT System with ConfidenceTesting the Scalability of a Robust IoT System with Confidence
Testing the Scalability of a Robust IoT System with ConfidenceHiveMQ
 
Designing an Edge to Cloud Architecture for IIoT
Designing an Edge to Cloud Architecture for IIoTDesigning an Edge to Cloud Architecture for IIoT
Designing an Edge to Cloud Architecture for IIoTHiveMQ
 
What's New in HiveMQ [Inside the Upcoming HiveMQ 4.7 Release]
What's New in HiveMQ [Inside the Upcoming HiveMQ 4.7 Release]What's New in HiveMQ [Inside the Upcoming HiveMQ 4.7 Release]
What's New in HiveMQ [Inside the Upcoming HiveMQ 4.7 Release]HiveMQ
 
HiveMQ & HighByte Presents: Building an Enterprise Unified Namespace (UNS) to...
HiveMQ & HighByte Presents: Building an Enterprise Unified Namespace (UNS) to...HiveMQ & HighByte Presents: Building an Enterprise Unified Namespace (UNS) to...
HiveMQ & HighByte Presents: Building an Enterprise Unified Namespace (UNS) to...HiveMQ
 
How MQTT 5 Makes Difficult IoT Use Cases Possible
How MQTT 5 Makes Difficult IoT Use Cases PossibleHow MQTT 5 Makes Difficult IoT Use Cases Possible
How MQTT 5 Makes Difficult IoT Use Cases PossibleHiveMQ
 
How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ HiveMQ
 
Connecting the Smart Factory to the Cloud
Connecting the Smart Factory to the CloudConnecting the Smart Factory to the Cloud
Connecting the Smart Factory to the CloudHiveMQ
 
Free Your Manufacturing Data with Apache PLC4X & MQTT
Free Your Manufacturing Data with Apache PLC4X & MQTTFree Your Manufacturing Data with Apache PLC4X & MQTT
Free Your Manufacturing Data with Apache PLC4X & MQTTHiveMQ
 
Build Your Own HiveMQ Extension
Build Your Own HiveMQ ExtensionBuild Your Own HiveMQ Extension
Build Your Own HiveMQ ExtensionHiveMQ
 
How to Set up, Run and Scale a Secure MQTT Broker on Kubernetes
How to Set up, Run and Scale a Secure MQTT Broker on KubernetesHow to Set up, Run and Scale a Secure MQTT Broker on Kubernetes
How to Set up, Run and Scale a Secure MQTT Broker on KubernetesHiveMQ
 
MQTT - The Key to Scalable Reliable Connected Car Platforms
MQTT - The Key to Scalable Reliable Connected Car PlatformsMQTT - The Key to Scalable Reliable Connected Car Platforms
MQTT - The Key to Scalable Reliable Connected Car PlatformsHiveMQ
 
Modernizing the Manufacturing Industry with MQTT and Kafka
Modernizing the Manufacturing Industry with MQTT and KafkaModernizing the Manufacturing Industry with MQTT and Kafka
Modernizing the Manufacturing Industry with MQTT and KafkaHiveMQ
 
4 Paradigm Shifts for the Connected Car of the Future
4 Paradigm Shifts for the Connected Car of the Future4 Paradigm Shifts for the Connected Car of the Future
4 Paradigm Shifts for the Connected Car of the FutureHiveMQ
 
Building Scalable & Reliable MQTT Clients for Enterprise Computing
Building Scalable & Reliable MQTT Clients for Enterprise ComputingBuilding Scalable & Reliable MQTT Clients for Enterprise Computing
Building Scalable & Reliable MQTT Clients for Enterprise ComputingHiveMQ
 
How to Stream IoT MQTT Messages Into the Azure Event Hubs Service
How to Stream IoT MQTT Messages Into the Azure Event Hubs ServiceHow to Stream IoT MQTT Messages Into the Azure Event Hubs Service
How to Stream IoT MQTT Messages Into the Azure Event Hubs ServiceHiveMQ
 

More from HiveMQ (15)

Testing the Scalability of a Robust IoT System with Confidence
Testing the Scalability of a Robust IoT System with ConfidenceTesting the Scalability of a Robust IoT System with Confidence
Testing the Scalability of a Robust IoT System with Confidence
 
Designing an Edge to Cloud Architecture for IIoT
Designing an Edge to Cloud Architecture for IIoTDesigning an Edge to Cloud Architecture for IIoT
Designing an Edge to Cloud Architecture for IIoT
 
What's New in HiveMQ [Inside the Upcoming HiveMQ 4.7 Release]
What's New in HiveMQ [Inside the Upcoming HiveMQ 4.7 Release]What's New in HiveMQ [Inside the Upcoming HiveMQ 4.7 Release]
What's New in HiveMQ [Inside the Upcoming HiveMQ 4.7 Release]
 
HiveMQ & HighByte Presents: Building an Enterprise Unified Namespace (UNS) to...
HiveMQ & HighByte Presents: Building an Enterprise Unified Namespace (UNS) to...HiveMQ & HighByte Presents: Building an Enterprise Unified Namespace (UNS) to...
HiveMQ & HighByte Presents: Building an Enterprise Unified Namespace (UNS) to...
 
How MQTT 5 Makes Difficult IoT Use Cases Possible
How MQTT 5 Makes Difficult IoT Use Cases PossibleHow MQTT 5 Makes Difficult IoT Use Cases Possible
How MQTT 5 Makes Difficult IoT Use Cases Possible
 
How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ
 
Connecting the Smart Factory to the Cloud
Connecting the Smart Factory to the CloudConnecting the Smart Factory to the Cloud
Connecting the Smart Factory to the Cloud
 
Free Your Manufacturing Data with Apache PLC4X & MQTT
Free Your Manufacturing Data with Apache PLC4X & MQTTFree Your Manufacturing Data with Apache PLC4X & MQTT
Free Your Manufacturing Data with Apache PLC4X & MQTT
 
Build Your Own HiveMQ Extension
Build Your Own HiveMQ ExtensionBuild Your Own HiveMQ Extension
Build Your Own HiveMQ Extension
 
How to Set up, Run and Scale a Secure MQTT Broker on Kubernetes
How to Set up, Run and Scale a Secure MQTT Broker on KubernetesHow to Set up, Run and Scale a Secure MQTT Broker on Kubernetes
How to Set up, Run and Scale a Secure MQTT Broker on Kubernetes
 
MQTT - The Key to Scalable Reliable Connected Car Platforms
MQTT - The Key to Scalable Reliable Connected Car PlatformsMQTT - The Key to Scalable Reliable Connected Car Platforms
MQTT - The Key to Scalable Reliable Connected Car Platforms
 
Modernizing the Manufacturing Industry with MQTT and Kafka
Modernizing the Manufacturing Industry with MQTT and KafkaModernizing the Manufacturing Industry with MQTT and Kafka
Modernizing the Manufacturing Industry with MQTT and Kafka
 
4 Paradigm Shifts for the Connected Car of the Future
4 Paradigm Shifts for the Connected Car of the Future4 Paradigm Shifts for the Connected Car of the Future
4 Paradigm Shifts for the Connected Car of the Future
 
Building Scalable & Reliable MQTT Clients for Enterprise Computing
Building Scalable & Reliable MQTT Clients for Enterprise ComputingBuilding Scalable & Reliable MQTT Clients for Enterprise Computing
Building Scalable & Reliable MQTT Clients for Enterprise Computing
 
How to Stream IoT MQTT Messages Into the Azure Event Hubs Service
How to Stream IoT MQTT Messages Into the Azure Event Hubs ServiceHow to Stream IoT MQTT Messages Into the Azure Event Hubs Service
How to Stream IoT MQTT Messages Into the Azure Event Hubs Service
 

Recently uploaded

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 

Recently uploaded (20)

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 

IoT Security Issues and MQTT

  • 1. Copyright © by HiveMQ. All Rights Reserved.
  • 2. Copyright © by HiveMQ. All Rights Reserved. Speaker ● Product Marketing lead at HiveMQ ● Telecoms, Unified Comms, Networking, Software technology ● Solutions Architect and Product Manager ● Based in Ottawa, Canada gaurav.suman@hivemq.com Gaurav Suman https://www.linkedin.com/in/grvsmn/ @grvsmn Product Marketing Director @HiveMQ
  • 3. Copyright © by HiveMQ. All Rights Reserved. Why is IoT Security on top-of-mind for devs and architects?
  • 4. Copyright © by HiveMQ. All Rights Reserved. The Internet of Things is HUGE Copyright © by HiveMQ. All Rights Reserved.
  • 5. Copyright © by HiveMQ. All Rights Reserved. The risks are clear
  • 6. Copyright © by HiveMQ. All Rights Reserved. IoT security challenges are unique ● Low-power devices Copyright © by HiveMQ. All Rights Reserved. ● Spread far and wide ● Long lifecycle of devices
  • 7. Copyright © by HiveMQ. All Rights Reserved. HiveMQ: Security Copyright © by HiveMQ. All Rights Reserved.
  • 8. Copyright © by HiveMQ. All Rights Reserved. Multiple Security Layers Network Host Application Data Enterprise We will bankrupt ourselves in the vain search for absolute security. - D.E. Eisenhower
  • 9. Copyright © by HiveMQ. All Rights Reserved. Securing the IoT connectivity stack
  • 10. Copyright © by HiveMQ. All Rights Reserved. What’s special about MQTT? Confidential and Proprietary. Copyright © by HiveMQ. All Rights Reserved.
  • 11. Copyright © by HiveMQ. All Rights Reserved. What Is MQTT? • Easy on the device side, pushes all implementation complexity to the server • Publish/Subscribe based architecture • Created for extreme scale and instant data exchange • (I)IoT Messaging Protocol • Built for machines and constrained devices (binary, data agnostic) • Designed for reliable communication over unreliable channels
  • 12. Copyright © by HiveMQ. All Rights Reserved. Connected Car IIoT / Industry 4.0 Logistics Telecommunication IoT Messaging Middleware MQTT Use Cases
  • 13. Copyright © by HiveMQ. All Rights Reserved. The MQTT specification ‘specifies’ MQTT solutions are often deployed in hostile communication environments. In such cases, implementations will often need to provide mechanisms for: ● Authentication of users and devices ● Authorization of access to Server resources ● Integrity of MQTT Control Packets and application data contained therein ● Privacy of MQTT Control Packets and application data contained therein
  • 14. Copyright © by HiveMQ. All Rights Reserved. MQTT Broker • Conserve • Decouple • Centralize Policy
  • 15. Copyright © by HiveMQ. All Rights Reserved. Transport Encryption ● MQTT is based on TCP / IP Stack ● Port 1883: MQTT over TCP / TLS ● TCP connection can be secured by TLS ● Port 8883: MQTT over TLS
  • 16. Copyright © by HiveMQ. All Rights Reserved. How MQTT helps secure IoT
  • 17. Copyright © by HiveMQ. All Rights Reserved. Authentication and Authorization
  • 18. Copyright © by HiveMQ. All Rights Reserved. ● Client ID ● Username ● Password ● Digital Certificates ● OAuth, JWT Copyright © by HiveMQ. All Rights Reserved. Authentication
  • 19. Copyright © by HiveMQ. All Rights Reserved. ● Digital Certificates ● Wire the broker and the auth store Copyright © by HiveMQ. All Rights Reserved. Advanced Authentication Options
  • 20. Copyright © by HiveMQ. All Rights Reserved. ● Typically relies on a public certificate authority ● Can also work with private certificates ○ Only for closed networks Using certificates for TLS
  • 21. Copyright © by HiveMQ. All Rights Reserved. ● You need control over the MQTT client ● Managing the Certificate lifecycle ○ Certification Revocation Lists (CRLs) ○ Online Certificate Status Protocol Copyright © by HiveMQ. All Rights Reserved. Consider these when using X.509 based Authentication
  • 22. Copyright © by HiveMQ. All Rights Reserved. OCSP Stapling: Authentication at Scale
  • 23. Copyright © by HiveMQ. All Rights Reserved. Client Authentication (Identity and Access Management Systems) ● Different external systems can be used to authenticate clients at a broker ● Client provides authentication data in the CONNECT packet ● Broker looks up the authentication data in the connected external systems ● External authentication systems: ○ LDAP ○ OAuth2.0 ○ Databases ○ ACL ○ ... Caution: Not all brokers support a pluggable authentication and authorization system!
  • 24. Copyright © by HiveMQ. All Rights Reserved. Creating Custom Authentication Logic
  • 25. Copyright © by HiveMQ. All Rights Reserved. ● Publisher and Subscriber Authorization ○ Whether they can publish/subscribe ○ Which QoS level ○ Operations (read, write) Copyright © by HiveMQ. All Rights Reserved. Authorization
  • 26. Copyright © by HiveMQ. All Rights Reserved. Permissions
  • 27. Copyright © by HiveMQ. All Rights Reserved. Encryption
  • 28. Copyright © by HiveMQ. All Rights Reserved. Transport Encryption - Best Practices • Use transport encryption (TLS) • Use certificates from trusted CAs • Use highest TLS version and secure cipher suites
  • 29. Copyright © by HiveMQ. All Rights Reserved. Payload Encryption ● Use payload encryption instead ● Every clients needs to have key & secret ● BUT!: It leaks metadata On very constrained devices transport encryption may be not possible!
  • 30. Copyright © by HiveMQ. All Rights Reserved. DoS and Overload Protection ● Limit Connections and Connection Idle times ● Throttle Connection Rates including Burst Rates ● Throttle SSL Handshakes ● Throttle Network Bandwidth ● Cluster Overload Protection throttles overactive publishing clients to prevent cluster overload ● Limit ClientID and topic length to prevent malfunctioning IoT access
  • 31. Copyright © by HiveMQ. All Rights Reserved. Criteria for selecting the right MQTT Broker • Performant, scalable and high available broker • Compliance to the entire MQTT specification • Monitoring of broker and tracing of devices • Pluggable authentication & authorization system • Overload Protection • Supports TLS • Professional support
  • 32. Copyright © by HiveMQ. All Rights Reserved. HiveMQ Security Architecture ● Pluggable Authentication and Authorization System ● Prebuilt Security Extension ● TLS secured communication ● Overload Protection and (D)DOS detection ● Fine grained permission system for MQTT clients and HiveMQ Control Center users ● Chaining of auth mechanisms ● Default Deny-All behaviour ● Integrated monitoring system and over 1500 metrics ● 24/7 professional support
  • 33. Copyright © by HiveMQ. All Rights Reserved. HiveMQ Enterprise Security Extension • Central management for IoT device and HiveMQ Control Center authentication and authorization • Flexible and easy integration with multiple external authentication systems and data sources (e.g. databases, LDAP, OAuth 2.0) • High Scalability and reliability • Default Whitelisting Concept • Access log (rolling on daily basis) • Provides maximum flexibility in defining authorization rules
  • 34. Copyright © by HiveMQ. All Rights Reserved. Resources Evaluate HiveMQ Try HiveMQ Cloud Get Started with MQTT HiveMQ Enterprise Security Extension Blog Series | MQTT Security Fundamentals Watch Our Previous Security Webinar Recording
  • 35. ANY QUESTIONS? Reach out to community.hivemq.com
  • 36. THANK YOU Contact Details Gaurav Suman gaurav.suman@hivemq.com https://www.linkedin.com/in/grvsmn/